fail2ban bad ip database: ip 104.238.92.100

| ip database | live view | stats | report | help | api key:

ip: 104.238.92.100
hostname: ip-104-238-92-100.ip.secureserver.net
country: [??] UNKNOWN
first reported: 17.09.2018 23:47.24 GMT+0100
last reported: 28.11.2018 12:51.06 GMT+0100
time period: 71d 14h 03m 42s
total reports: 10
reported by: 2 host(s)
filter(s): sshd (6)
ssh (4)
tor exit node no
badips.com db
Lookup
  

port scan of '104.238.92.100':

[-hide]
# Nmap 6.40 scan initiated Mon Sep 17 23:48:02 2018 as: /usr/bin/nmap -sU -sS -O 104.238.92.100
Nmap scan report for ip-104-238-92-100.ip.secureserver.net (104.238.92.100)
Host is up (0.14s latency).
Not shown: 1974 closed ports
PORT     STATE         SERVICE
22/tcp   open          ssh
42/tcp   filtered      nameserver
80/tcp   open          http
111/tcp  open          rpcbind
135/tcp  filtered      msrpc
139/tcp  filtered      netbios-ssn
161/tcp  filtered      snmp
179/tcp  filtered      bgp
1028/tcp filtered      unknown
1080/tcp filtered      socks
3128/tcp filtered      squid-http
6666/tcp filtered      irc
6667/tcp filtered      irc
6668/tcp filtered      irc
19/udp   open|filtered chargen
42/udp   open|filtered nameserver
69/udp   open|filtered tftp
111/udp  open          rpcbind
135/udp  open|filtered msrpc
137/udp  open|filtered netbios-ns
138/udp  open|filtered netbios-dgm
139/udp  open|filtered netbios-ssn
161/udp  open|filtered snmp
162/udp  open|filtered snmptrap
1019/udp open|filtered unknown
1701/udp open|filtered L2TP
Device type: general purpose
Running: Linux 3.X
OS CPE: cpe:/o:linux:linux_kernel:3
OS details: Linux 3.0 - 3.9
Network Distance: 10 hops

OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
# Nmap done at Tue Sep 18 00:11:11 2018 -- 1 IP address (1 host up) scanned in 1389.51 seconds
Σ = 17 | Δt = 0.0057041645050049s